(LiveHacking.Com) —Apple released iOS 4.3.4 a few days ago to close a vulnerability which allowed iOS devices to be jailbroken using a specially crafted PDF file. The most successful exploit of this hole was the JailBreakMe 3.0 web site which allowed users to jailbreak their iOS devices by visiting the site and downloading a PDF.

Comex the developer of the JailBreakMe 3.0 system has now released the source code to the system and so provide students and security professionals a valuable resource to study, learn and understand the nature of iOS jail breaking and in paticular PDF exploits.

Hosted by GitHub, a web-based source code repository that uses Git for revision control, the system is made up from a collection of higher level python code to manage the jailbreak (creation of the FreeType exploit file, packaging, delivery etc) and some low level C and assembler code to jail break the device.